|
|
|
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt...
ver más
|
|
|
|
|
|
|
Ivan Nedyalkov
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ...
ver más
|
|
|
|
|
|
|
Morteza Biabani, Nasser Yazdani and Hossein Fotouhi
Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN). The adaptability and ...
ver más
|
|
|
|
|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also b...
ver más
|
|
|
|
|
|
|
Robert Guirado, Joan-Cristian Padró, Albert Zoroa, José Olivert, Anica Bukva and Pedro Cavestany
This study provides an operational solution to directly connect drones to internet by means of 4G telecommunications and exploit drone acquired data, including telemetry and imagery but focusing on video transmission. The novelty of this work is the appl...
ver más
|
|
|
|
|
|
|
Adnan Mohsin Abdulazeez,Baraa Wasfi Salim,Diyar Qader Zeebaree,Dana Doghramachi
Pág. pp. 157 - 177
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly hi...
ver más
|
|
|
|
|
|
|
Lucas Trombeta and Nunzio Marco Torrisi
This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-camp...
ver más
|
|
|
|
|
|
|
O. Ribero, D. Garzón, Y. Alvarado, I. Gasch
Pág. Page 146
This article discusses the economic benefits of the implementation of the sustainable building LEED (Leadership in Energy and Environmental Design) certification in the Centro Ático building located in Bogotá, Colombia. Initially, the consumption of wate...
ver más
|
|
|
|
|
|
|
Devi Ruwaida,Dian Kurnia
Pág. 45 - 49
File Transfer Protocol (FTP) server merupakan jenis sistem yang menghubungkan hak pengakses (client) dan penyedia (server) dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dala...
ver más
|
|
|
|